-
Discrimination warning over U.K. airport body scanners
U.K. equality watchdog wrote U.K. home secretary to say it was “concerned that that the proposals to introduce body scanners are likely to have a negative impact on individuals’ rights to privacy, especially members of particular groups including disabled people, older people, children, transgendered people, women and religious groups”
-
-
Tories say they will set up a permanent “War Cabinet”
The Conservative Party is favored to win the next general elections in Britain, which will be held before the summer; on Friday the party’s leader, David Cameron, set out the party’s national security plan, emphasizing cybersecurity
-
-
Why the U.S. needs an infrastructure bank
The U.S. aging infrastructure will eventually constrain economic growth; government alone can no longer finance all of the nation’s infrastructure requirements; a national infrastructure bank (NIB) could fill the gap; the NIB could attract private funds to co-invest in projects that pass rigorous cost-benefit tests, and that generate revenues through user fees or revenue guarantees from state and local governments; investors could choose which projects meet their investment criteria, and, in return, share in project risks that today fall solely on taxpayers
-
-
Chinese cyber attacks hit U.S. law firm which is suing China for stealing Web filtering code form a U.S. company
The Los Angeles-based law firm Gipson Hoffman & Pancione sued China for lifting Web-filtering code developed by U.S. company Cybersitter; Chinese companies and government agencies stole the code in order to use it in the Chinese government’s effort to create tighter Web censorship and tracking system (China’s Orwellian name for the project” “The Green Dam Youth Escort monitoring program”); on Monday, Chinese hackers began to hack the law firm’s computer systems, in a manner strikingly similar to the attacks by Chinese intelligence operatives on Google, Adobe Systems, and 32 other Western companies
-
-
China tries to contain damage from Google dispute
The Chinese government says it will try to persuade Google to continue its operations in China, but expect Google – and other foreign companies — to “respect local law and regulations and local culture and customs to shoulder social responsibility”; Google already made concessions to Chinese law and regulations by allowing the government to dictate what users can – and cannot — find when they do Google searches; Google’s decision to leave China came after Chinese intelligence agents hacked the Gmail accounts of political dissidents and human rights activitists
-
-
Scientists cautiously optimistic as Doomsday clock reset
The minute hand of the Bulletin of Atomic Scientists’ Doomsday clock was moved back one minute – to seven minutes to midnight – to indicate a slight improvement in the world’s nuclear weapons situation; midnight on the clock signifies the apocalypse, and the minute hand symbolizes the countdown to disaster
-
-
U.S. looking for intellectual property offenders
The Trade Act of 1974 mandate that the U.S. Trade Representative (USTR) “identify countries that deny adequate and effective protection of intellectual property rights or deny fair and equitable market access to U.S. persons who rely on intellectual property protection”; the USTR has just called for public comments to point out foreign governments that have not lived up to their obligations to protect U.S. intellectual property rights; last year, the USTR investigated 77 U.S. trading partners for possible intellectual property rights violations, resulting in 45 countries being placed on either the Priority Watch List or the Watch List for their weak intellectual property rights protection regime
-
-
Google to pull out of China following government-sponsored cyberattacks
In order to operate in China, Google agreed to implement stringent government-dictated censorship as to what Chinese consumers can – and cannot – find when doing Google searches; Google’s compliance with Chinese censorship was harshly criticized by human rights and freedom-of-speech organizations, but Google responded that this was the cost of doing business in China; the Chinese government’s hacking of Gmail accounts in order to monitor political dissidents proved to much for Google, though, and the company is now set to end its operations in China
-
-
Google’s decision a rare show of defiance in China
Google’s decision to leave China is a rare show of defiance in a market where the government punishes those who do not play by the rules; in industries from automaking to fast food, companies have been forced to allow communist authorities to influence — and sometimes dictate — their choice of local partners, where to operate, and what products to sell; many high-tech companies operating in China are forced to open their intellectual property and industrial secrets to their Chinese competitors – or to Chinese government officials, who pass on that property to Chinese companies – allowing these Chinese companies to reverse engineer and copy Western companies’ products and solutions; Western companies have struggled to make headway against intense competition from Chinese rivals – rivals who enjoy the fact that the Chinese government writes rules which tilt the playing field in favor of Chinese companies
-
-
French court says “pourquoi pas?” to work-place smut
French court rules that Peugeot was wrong to fire an employee who used his work PC to download pornography; the court said that the mere act of downloading smut is not enough to have an employee fired; the hold for the company, the court said Peugot had to show that that the downloading impacted on performance because the employee was busy doing things he should not during his working day, or that the downloads were so big that they interfered with the proper functioning of the system, or came with viruses attached, or that the content was itself illegal (featuring child abuse)
-
-
Budget cuts more than $600 million from Bioshield program
Randall Larsen, executive director of the congressionally chartered Commission on the Prevention of Weapons of Mass Destruction Proliferation and Terrorism: “Using Bioshield funds for flu preparedness and other issues not associated with national security will severely diminish the nation’s efforts to prepare for WMD events and will leave the nation less, not more, prepared”
-
-
Islamic suicide bombing in historical perspective
The suicide bombing campaign by al Qaeda and its Sunni Arab allies in Iraq is second only to the Japanese Kamikaze campaign during the closing stages of the Second World in the number of suicide bombers it employed; the Islamic suicide bombers, though, managed to kill more people; the Kamikaze sank 34 U.A. and Allied ships and damage 368 others; about 4,900 Allied sailors died; the Islamic suicide bombers in Iraq killed 216 U.S. military personnel, 2,500 Iraqi troops and police, and more than 10,000 Iraqi civilian
-
-
Declassified report details intelligence failures leading up to failed terrorist attack
The report criticizes the U.S. counterterrorism (CT)community for not connecting the dots related to the Christmas Day plot; “Unfortunately, despite several opportunities that might have allowed the CT community to put these pieces together in this case, and despite the tireless effort and best intentions of individuals at every level of the CT community, that was not done”
-
-
FTC to examine cloud computing privacy concerns
The FTC says it wants to examine potential threats to consumer privacy and data security posed by cloud computing services; David Vladeck, director of the FTC’s Bureau of Consumer Protection: “The ability of cloud computing services to collect and centrally store increasing amounts of consumer data, combined with the ease with which such centrally stored data may be shared with others, create a risk that larger amounts of data may be used by entities in ways not originally intended or understood by consumers”
-
-
China offers Internet pirates bulletproof havens for illegal file sharing
Most bulletproof hosts which allow music, video, and software to be illegally shared online are located in China, where criminals are able to take advantage of low costs and legal loopholes to avoid prosecution; despite officials in Beijing talking in tough terms about computer crime — hacking potentially carries a death sentence in China — the authorities rarely cooperate with other countries to take action against hi-tech criminals; as a result, just a handful of firms in China are responsible for hosting thousands of criminal enterprises online; one example: more than 22,000 Web sites which sent pharmaceutical spam were hosted by six bulletproof servers in China
-
More headlines
The long view
Factories First: Winning the Drone War Before It Starts
Wars are won by factories before they are won on the battlefield,Martin C. Feldmann writes, noting that the United States lacks the manufacturing depth for the coming drone age. Rectifying this situation “will take far more than procurement tweaks,” Feldmann writes. “It demands a national-level, wartime-scale industrial mobilization.”
No Nation Is an Island: The Dangers of Modern U.S. Isolationism
The resurgence of isolationist sentiment in American politics is understandable but misguided. While the desire to refocus on domestic renewal is justified, retreating from the world will not bring the security, prosperity, or sovereignty that its proponents promise. On the contrary, it invites instability, diminishes U.S. influence, and erodes the democratic order the U.S. helped forge.
Fragmented by Design: USAID’s Dismantling and the Future of American Foreign Aid
The Trump administration launched an aggressive restructuring of U.S. foreign aid, effectively dismantling the United States Agency for International Development (USAID). The humanitarian and geopolitical fallout of the demise of USAID includes shuttered clinics, destroyed food aid, and China’s growing influence in the global south. This new era of American soft power will determine how, and whether, the U.S. continues to lead in global development.
Water Wars: A Historic Agreement Between Mexico and US Is Ramping Up Border Tension
As climate change drives rising temperatures and changes in rainfall, Mexico and the US are in the middle of a conflict over water, putting an additional strain on their relationship. Partly due to constant droughts, Mexico has struggled to maintain its water deliveries for much of the last 25 years, deliveries to which it is obligated by a 1944 water-sharing agreement between the two countries.
How Disastrous Was the Trump-Putin Meeting?
In Alaska, Trump got played by Putin. Therefore, Steven Pifer writes, the European leaders and Zelensky have to “diplomatically offer suggestions to walk Trump back from a position that he does not appear to understand would be bad for Ukraine, bad for Europe, and bad for American interests. And they have to do so without setting off an explosion that could disrupt U.S.-Ukrainian and U.S.-European relations—all to the delight of Putin and the Kremlin.”
How Male Grievance Fuels Radicalization and Extremist Violence
Social extremism is evolving in reach and form. While traditional racial supremacy ideologies remain, contemporary movements are now often fueled by something more personal and emotionally resonant: male grievance.